René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

166 lines
5.6 KiB
JSON

{
"id": "CVE-2019-11209",
"sourceIdentifier": "security@tibco.com",
"published": "2019-08-20T18:15:11.173",
"lastModified": "2020-08-24T17:37:01.140",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The realm configuration component of TIBCO Software Inc.'s TIBCO FTL Community Edition, TIBCO FTL Developer Edition, TIBCO FTL Enterprise Edition contains a vulnerability that theoretically fails to properly enforce access controls. This issue affects TIBCO FTL Community Edition 6.0.0; 6.0.1; 6.1.0, TIBCO FTL Developer Edition 6.0.1; 6.1.0, and TIBCO FTL Enterprise Edition 6.0.0; 6.0.1; 6.1.0."
},
{
"lang": "es",
"value": "El componente de configuraci\u00f3n de realm de TIBCO FTL Community Edition, TIBCO FTL Developer Edition, TIBCO FTL Enterprise Edition de TIBCO Software Inc. contiene una vulnerabilidad que te\u00f3ricamente no aplica correctamente los controles de acceso. Este problema afecta a TIBCO FTL Community Edition 6.0.0; 6.0.1; 6.1.0, TIBCO FTL Developer Edition 6.0.1; 6.1.0 y TIBCO FTL Enterprise Edition 6.0.0; 6.0.1; 6.1.0"
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security@tibco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:ftl:6.0.0:*:*:*:community:*:*:*",
"matchCriteriaId": "A4DC2A2F-5FCE-4A7A-9A4E-F15F03191A2E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:ftl:6.0.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "4D77DBC6-B022-40CD-A95F-B8158EA5ADE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:ftl:6.0.1:*:*:*:community:*:*:*",
"matchCriteriaId": "F6F66625-0337-440E-8F96-1F83CE766BDC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:ftl:6.0.1:*:*:*:developer:*:*:*",
"matchCriteriaId": "D0E5C155-CB3B-4B05-93D5-DD5BF97CE897"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:ftl:6.0.1:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "ACA5B292-8AF9-4ED4-99F6-9AEF672C65CD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:ftl:6.1.0:*:*:*:community:*:*:*",
"matchCriteriaId": "CE032C94-27D5-4F5C-AF34-5E029C1AFD7B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:ftl:6.1.0:*:*:*:developer:*:*:*",
"matchCriteriaId": "169C8B4B-3933-498D-966D-CE29380D91A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:ftl:6.1.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "31578219-77BD-4F50-9199-6B60AB132F0F"
}
]
}
]
}
],
"references": [
{
"url": "http://www.tibco.com/services/support/advisories",
"source": "security@tibco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tibco.com/support/advisories/2019/08/tibco-security-advisory-august-20-2019-tibco-ftl",
"source": "security@tibco.com",
"tags": [
"Vendor Advisory"
]
}
]
}